100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Resumen

Summary Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan i

Puntuación
-
Vendido
-
Páginas
13
Subido en
01-12-2024
Escrito en
2024/2025

Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is typically a backdoor that allows attackers to gain access to the infected computer. Trojans also give cybercriminals access to sensitive, confidential information of a user, such as IP addresses, passwords, and banking details. Oftentimes, Trojans are delivered via email attachments, drive- by downloads, and/or posing as a legitimate application with hidden, malicious code embedded. Once executed, Trojans deliver their payload and find ways to spread.Preparationï‚· Decide who should be members of the Cybersecurity Incident Response Team (CSIRT).o Vulnerability Manager, Threat Manager, Risk Manager.o CSIRT core members should be comprised of cybersecurity personnel.o Assign roles and responsibilities to every me

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
1 de diciembre de 2024
Número de páginas
13
Escrito en
2024/2025
Tipo
Resumen

Temas

Vista previa del contenido

Wk 5 - Apply: Summative Assessment: Backup Policies

University of Phoenix

CYB/110

A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is
typically a backdoor that allows attackers to gain access to the infected computer. Trojans also
give cybercriminals access to sensitive, confidential information of a user, such as IP addresses,
passwords, and banking details. Oftentimes, Trojans are delivered via email attachments, drive-
by downloads, and/or posing as a legitimate application with hidden, malicious code embedded.
Once executed, Trojans deliver their payload and find ways to spread.


Preparation

 Decide who should be members of the Cybersecurity Incident Response Team (CSIRT).
o Vulnerability Manager, Threat Manager, Risk Manager.
o CSIRT core members should be comprised of cybersecurity personnel.
o Assign roles and responsibilities to every member.
 Determine Extended CSIRT Team members and Define Roles.
o Executive Lead, Professional Services Lead, Response Support (Legal, Public
Relations, Compliance, etc.).
 Define escalation paths.
o Incidents may start as lower impact/severity ratings and then increase as more
information is gathered. Establishing an escalation path is critical.
 Evaluate and secure critical system backups.
o Backups should be created, maintained, and secured before any incidents occur.
o During the initial stages of any incident, verify that backups are secure and not
impacted by the incident.

Detection
 Define Threat Indicators
o Unknown or unexpected services and applications configured to launch
automatically upon system boot.

, o Unknown or unexpected outgoing internet traffic.
o Anti-virus programs malfunctioning or becoming disabled for unknown reasons.
o Degraded processing capability (increased CPU utilization).
 Isolate infected systems ASAP.
o DO NOT power off machines, as forensic artifacts could be lost.
o Preserve the system(s) for further forensic investigation, reviewing system logs
and performing deep scans for malware.
 These steps should be performed to guide the investigation.
 Investigate malware to see if it is running with a user accounts credentials.
o If so, disable the user account(s) until the investigation is complete.
 Analyze the malware to determine how to contain the outbreak.
o If available, use a sandboxed malware analysis system to perform analysis.
$7.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
newage Uop
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
22
Miembro desde
3 año
Número de seguidores
15
Documentos
4723
Última venta
6 meses hace
A+ Self prepared Study guides for my peers

Truly helpful study guides

4.2

6 reseñas

5
3
4
1
3
2
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes